File _patchinfo of Package patchinfo.29566

<patchinfo incident="29566">
  <issue id="1207189" tracker="bnc">VUL-0: CVE-2023-23455: kernel live patch: type-confusion in the ATM network scheduler</issue>
  <issue id="1210452" tracker="bnc">VUL-0: CVE-2023-28466: kernel live patch: do_tls_getsockopt lacks a lock_sock call, leading to a race condition</issue>
  <issue id="1210779" tracker="bnc">VUL-0: CVE-2023-1390: kernel live patch: remote DoS in TIPC kernel module</issue>
  <issue id="1210989" tracker="bnc">VUL-0: CVE-2023-31436: kernel live patch: heap out-of-bounds read/write vulnerability in traffic control (QoS) subsystem</issue>
  <issue id="2023-1390" tracker="cve" />
  <issue id="2023-23455" tracker="cve" />
  <issue id="2023-28466" tracker="cve" />
  <issue id="2023-31436" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 4.12.14-150100_197_126 fixes several issues.

The following security issues were fixed:

- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
</description>
<summary>Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1)</summary>
</patchinfo>
openSUSE Build Service is sponsored by